- Description
- A command injection vulnerability has been reported to affect several QNAP operating system versions. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.3.3006 build 20250108 and later
- Source
- security@qnapsecurity.com.tw
- NVD status
- Analyzed
- Products
- qts, quts_hero
CVSS 4.0
- Type
- Secondary
- Base score
- 2
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- LOW
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security@qnapsecurity.com.tw
- CWE-78
- Hype score
- Not currently trending
CVE-2024-14026 A command injection vulnerability has been reported to affect several QNAP operating system versions. If an attacker gains local network access who have also gained a… https://t.co/NZ2v5Kuspq
@CVEnew
15 Mar 2026
159 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-14026 Local Command Injection Vulnerability in QNAP QTS and QuTS hero Versions https://t.co/m8q6qpRup6
@VulmonFeeds
11 Mar 2026
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
"matchCriteriaId": "39382CBA-EA68-426A-AC07-A9A26E722CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
"matchCriteriaId": "BCB37C08-1DF7-4AF4-9BB1-C562E5643B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
"matchCriteriaId": "8368130C-F26D-41FE-8D78-B103A23B5327",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*",
"matchCriteriaId": "3E0EE181-78AF-4C3C-90A4-C69A2DE6E176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*",
"matchCriteriaId": "56E3AE06-78DA-4844-ADC1-09A35F1C5B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*",
"matchCriteriaId": "D2AA7A32-0DA8-4417-A23E-C4F563BC7819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*",
"matchCriteriaId": "80E7C17C-ED6D-439D-A1F3-1870A3ADA926",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*",
"matchCriteriaId": "636C2D9C-C837-4FAC-B79D-1CA7A7C1FF3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.4.2596:build_20231128:*:*:*:*:*:*",
"matchCriteriaId": "866B455B-0266-4990-920B-A06756ED5A61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.5.2645:build_20240116:*:*:*:*:*:*",
"matchCriteriaId": "B3B5C4C5-5EE2-4E6F-927E-1D52A04895BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.5.2679:build_20240219:*:*:*:*:*:*",
"matchCriteriaId": "543E17BB-B552-4B65-B028-BE9A47E6F34B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.6.2722:build_20240402:*:*:*:*:*:*",
"matchCriteriaId": "EEDC247A-96D9-4140-AA72-52E4EEDC2121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.7.2770:build_20240520:*:*:*:*:*:*",
"matchCriteriaId": "DDEF21B3-275E-446B-A6C4-FD30A567B600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.1.8.2823:build_20240712:*:*:*:*:*:*",
"matchCriteriaId": "4A0C7EC7-A0A4-4100-927A-0D673F784502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*",
"matchCriteriaId": "F4026A4B-7AB4-48EA-971D-88DFDD3F01A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*",
"matchCriteriaId": "1F3F99BB-0D68-4D74-92C8-59E24F96C50D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*",
"matchCriteriaId": "1DE63B4D-8E84-41D3-B1F3-04AE6040242B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*",
"matchCriteriaId": "75746563-C648-4E55-9126-703F915F8B8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*",
"matchCriteriaId": "AF6BA027-A635-4E90-80C8-130B10AB3D23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*",
"matchCriteriaId": "5406F242-A215-4B07-809F-7A7CE55ACE71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*",
"matchCriteriaId": "FA17778E-B3B1-44DD-B4E9-5AD25A3E804C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*",
"matchCriteriaId": "E3FC6646-2247-4ED9-9643-CD376674E2E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*",
"matchCriteriaId": "62170342-067D-442C-88FB-64A4BEA8AFE4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*",
"matchCriteriaId": "6CA398A8-EBDF-4D41-B15E-7B763F885021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*",
"matchCriteriaId": "F63A5ED2-ECC2-49A0-BFA9-548E35ACD6C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*",
"matchCriteriaId": "53387FAC-7BE0-47D7-99BF-2B1F03C17CC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*",
"matchCriteriaId": "D4226394-0023-4CD2-BB89-77251BF92FF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*",
"matchCriteriaId": "646257F7-D4A4-43B0-91F2-7850338B3CA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*",
"matchCriteriaId": "88825AE1-B006-4F7F-BD90-D4B1CF1251A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*",
"matchCriteriaId": "3F471666-4919-4770-956E-ACE4C55D29DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:build_20231128:*:*:*:*:*:*",
"matchCriteriaId": "9573F671-D49E-438A-B72C-DFC390A79093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2647:build_20240118:*:*:*:*:*:*",
"matchCriteriaId": "75E7938F-943F-428D-974D-42E790829F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2680:build_20240220:*:*:*:*:*:*",
"matchCriteriaId": "12F5732D-C95F-45D1-968C-C2269DFDF6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.6.2734:build_20240414:*:*:*:*:*:*",
"matchCriteriaId": "94734596-A56A-4128-A39A-7E22FBD17835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2770:build_20240520:*:*:*:*:*:*",
"matchCriteriaId": "ACF87C5E-9508-4BA9-9218-3CBD8A8439A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2788:build_20240607:*:*:*:*:*:*",
"matchCriteriaId": "67E8977A-2363-4855-B284-6EBF8FB485A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2794:build_20240613:*:*:*:*:*:*",
"matchCriteriaId": "3A268686-341F-4E13-8CE6-493DE7E9CF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.8.2823:build_20240712:*:*:*:*:*:*",
"matchCriteriaId": "D57D3028-1713-4530-A1EC-6D13A0E010C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*",
"matchCriteriaId": "CDCBB36A-CB91-4BA3-A6ED-952E6A4A0481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*",
"matchCriteriaId": "240BCFF1-CCCB-4C07-8E2C-7F43F68407FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*",
"matchCriteriaId": "D3AF7276-77E0-474A-B10F-AC15BC5FCF00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*",
"matchCriteriaId": "5FA8C3EC-B6C0-44A8-BC91-18E3E90C63AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*",
"matchCriteriaId": "889336D2-D9F7-4CC0-A22F-B837B5E77751",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*",
"matchCriteriaId": "98F72EB9-0EE3-416A-B9BB-2512F5203A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*",
"matchCriteriaId": "9110382F-57C2-4C2E-82D1-3246C882B2C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*",
"matchCriteriaId": "DB92EFD7-47DD-4AAC-97BD-A2D4918FF4ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*",
"matchCriteriaId": "78E38E23-1AD0-49E1-89FA-73DC2F496137",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*",
"matchCriteriaId": "F2F302B6-26CC-4044-B480-4EBDBB90797F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]